Biometric identification system
First Claim
1. A method for identity verification comprising the steps of:
- (a) comparing at least one first spoken voice print of a user speaking at least one piece of personal data against a first stored voice print of the user speaking said at least one piece of personal data;
(b) comparing at least one second spoken voice print of the user speaking at least one piece of travel data against a second stored voice print of the user speaking said piece of travel data; and
(c) determining if the user is a given individual based the results of step (a) and step (b).
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment the present invention provides a method for identity verification comprising the steps of: (a) comparing at least one first spoken voice print of a user speaking at least one piece of personal data against a first stored voice print of the user speaking said at least one piece of personal data; (b) comparing at least one second spoken voice print of the user speaking at least one piece of travel data against a second stored voice print of the user speaking said piece of travel data; and (c) determining if the user is a given individual based the results of step (a) and step (b). In other embodiments, the present invention provides a method for controlling the use of an object or service comprising the steps of: (a) comparing at least one first spoken voice print of a user speaking at least one piece of personal data against a first stored voice print of the user speaking said at least one piece of personal data; (b) comparing at least one second spoken voice print of the user speaking at least one piece of object identification data or service identification data against a second stored voice print of the user speaking said piece of object identification data; and (c) determining if the user is allowed to use said object or service based on the results of steps (a) and (b).
99 Citations
80 Claims
-
1. A method for identity verification comprising the steps of:
-
(a) comparing at least one first spoken voice print of a user speaking at least one piece of personal data against a first stored voice print of the user speaking said at least one piece of personal data;
(b) comparing at least one second spoken voice print of the user speaking at least one piece of travel data against a second stored voice print of the user speaking said piece of travel data; and
(c) determining if the user is a given individual based the results of step (a) and step (b). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A machine readable medium storing instructions that, if executed by a computer system, causes the computer system to perform a set of operations comprising the steps of:
-
(a) comparing at least one first spoken voice print of a user speaking at least one piece of personal data against a first stored voice print of the user speaking said at least one piece of personal data;
(b) comparing at least one second spoken voice print of the user speaking at least one piece of travel data against a second stored voice print of the user speaking said piece of travel data; and
(c) determining if the user is a given individual based the results of step (a) and step (b). - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A computer system implementing a method for identity verification comprising the steps of:
-
(a) comparing at least one first spoken voice print of a user speaking at least one piece of personal data against a first stored voice print of the user speaking said at least one piece of personal data;
(b) comparing at least one second spoken voice print of the user speaking at least one piece of travel data against a second stored voice print of the user speaking said piece of travel data; and
(c) determining if the user is a given individual based the results of step (a) and step (b). - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A method for controlling the use of an object comprising the steps of:
-
(a) comparing at least one first spoken voice print of a user speaking at least one piece of personal data against a first stored voice print of the user speaking said at least one piece of personal data;
(b) comparing at least one second spoken voice print of the user speaking at least one piece of object identification data against a second stored voice print of the user speaking said piece of object identification data; and
(c) determining if the user is allowed to use said object based on the results of steps (a) and (b). - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. A machine readable medium storing instructions that, if executed by a computer system, causes the computer system to perform a set of operations comprising the steps of:
-
(a) comparing at least one first spoken voice print of a user speaking at least one piece of personal data against a first stored voice print of the user speaking said at least one piece of personal data;
(b) comparing at least one second spoken voice print of the user speaking at least one piece of object identification data against a second stored voice print of the user speaking said piece of object identification data; and
(c) determining if the user is allowed to use said object based on the results of steps (a) and (b). - View Dependent Claims (44, 45, 46, 47, 48, 49, 50, 51, 52, 53)
-
-
54. A computer system implementing a method for controlling access to an object comprising the steps of:
-
(a) comparing at least one first spoken voice print of a user speaking at least one piece of personal data against a first stored voice print of the user speaking said at least one piece of personal data;
(b) comparing at least one second spoken voice print of the user speaking at least one piece of object identification data against a second stored voice print of the user speaking said piece of object identification data; and
(c) determining if the user is allowed to use said object based on the results of steps (a) and (b). - View Dependent Claims (55, 56, 57, 58, 59, 60, 61, 62, 63, 64)
-
-
65. A method for controlling the use of a service comprising the steps of:
-
(a) comparing at least one first spoken voice print of a user speaking at least one piece of personal data against a first stored voice print of the user speaking said at least one piece of personal data;
(b) comparing at least one second spoken voice print of the user speaking at least one piece of service identification data against a second stored voice print of the user speaking said piece of service identification data; and
(c) determining if the user is allowed to use said service based on the results of steps (a) and (b). - View Dependent Claims (66, 67, 68, 69, 70)
-
-
71. A machine readable medium storing instructions that, if executed by a computer system, causes the computer system to perform a set of operations comprising the steps of:
-
(a) comparing at least one first spoken voice print of a user speaking at least one piece of personal data against a first stored voice print of the user speaking said at least one piece of personal data;
(b) comparing at least one second spoken voice print of the user speaking at least one piece of service identification data against a second stored voice print of the user speaking said piece of service identification data; and
(c) determining if the user is allowed to use said service based on the results of steps (a) and (b). - View Dependent Claims (72, 73, 74, 75)
-
-
76. A computer system implementing a method for controlling access to a portable electronic device comprising the steps of:
-
(a) comparing at least one first spoken voice print of a user speaking at least one piece of personal data against a first stored voice print of the user speaking said at least one piece of personal data;
(b) comparing at least one second spoken voice print of the user speaking at least one piece of service identification data against a second stored voice print of the user speaking said piece of service identification data; and
(c) determining if the user is allowed to use said service based on the results of steps (a) and (b). - View Dependent Claims (77, 78, 79, 80)
-
Specification